Israeli cloud security firm Ermetic has disclosed three security flaws in Microsoft Azure API Management service, including two server-side request forgery (SSRF) flaws and one instance of unrestricted file upload functionality in the API Management developer portal.
Exploiting the vulnerabilities could allow threat actors to gain access to sensitive information and backend services, read internal Azure resources and execute unauthorized code. One of the SSRF flaws identified by Ermetic was a bypass for a fix put in place by Microsoft to address a similar vulnerability reported by Orca earlier this year.
Following responsible disclosure, all three flaws have been patched by Microsoft.
The Azure API Management platform enables organizations to securely expose their APIs to external and internal customers and enable a wide range of connected experiences.
The SSRF flaws identified by Ermetic could allow attackers to send requests from the service’s CORS Proxy and the hosting proxy itself, access internal Azure assets, deny service, and bypass web application firewalls. Meanwhile, the path traversal flaw discovered in the developer portal resulted from a lack of validation of the file type and path of the files uploaded.
An authenticated user could leverage this loophole to upload malicious files to the developer portal server and potentially execute arbitrary code on the underlying system.
The disclosure comes weeks after researchers from Orca detailed a “by-design flaw” in Microsoft Azure that could be exploited by attackers to gain access to storage accounts, move laterally in the environment, and even execute remote code.
It also follows the discovery of another Azure vulnerability dubbed EmojiDeploy that could enable an attacker to seize control of a targeted application.
Microsoft has urged its customers to regularly review security best practices and configurations, use multi-factor authentication and advanced security tools, and stay up to date with the latest security updates and patches.